¥À¥¤¥ä¥ë¥¢¥Ã¥×¥Í¥Ã¥È¥ï¡¼¥¯Àܳ¤ò¥¤¥á¡¼¥¸¤·¤Æ¤¯¤À¤µ¤¤¡£ÀܳÀè¤ÎÅÅÏÃÈÖ¹æ¤òÆþ¤ì¡¢RAS¤ËÀܳ¤Ë¹Ô¤¤Þ¤¹¡£ID¥Ñ¥¹¥ï¡¼¥É¤Çǧ¾Ú¤ò¤·¤Æ¡¢Àܳ¤ò¤·¤Þ¤¹¡£¤Ä¤Þ¤ê¡¢PPP¤Ç¤¹¡£
°ìÊýPPTP¤Ï,
Ʊ¤¸¤³¤È¤ò¡¢¥Ö¥í¡¼¥É¥Ð¥ó¥É´Ä¶¤Ç¹Ô¤¤¤Þ¤¹¡£ÀܳÀè¤È¤·¤ÆIP¥¢¥É¥ì¥¹¤òÆþ¤ì¡¢ÀܳÀè¤Î¥ë¡¼¥¿¤ËÀܳ¤Ë¤¤¤¤Þ¤¹¡£ID¥Ñ¥¹¥ï¡¼¥É¤Çǧ¾Ú¡¢Àܳ¤·¤Þ¤¹¡£PPP¤Î³ÈÄ¥¤È¹Í¤¨¤ì¤Ð¤è¤¤¤Ç¤·¤ç¤¦¡£
¡¦RC4¤ò»È¤Ã¤¿°Å¹æ¤¬¤Ç¤¤ë¤è¤¦¤Ë¹©Éפµ¤ì¤Æ¤¤¤ë¤Ï¤º¡£Ê¸¸¥¤Ë¤è¤Ã¤Æ¤Ï¡¢PPTPñÂΤǤΰŹ沽µ¡Ç½¤Ï¤Ê¤¤¤È¤¤¤¦É½¸½¤â¤¢¤ê¡£
¡¦PPP¤ÈƱÍͤˡ¢¥À¥¤¥ä¥ë¥¢¥Ã¥×¤¬´ðËܤλȤ¤Êý¤Ç¤¢¤ë¤¬¡¢LAN´ÖÀܳ¤â²Äǽ¡£
¢ªPPTP¤ÈL2F¤ò¹ç¤ï¤»¡¢L2TP(Layer2 Tunneling Protocol)¤È¤·¤ÆÉ¸½à²½¡£
L2TP¤Ï°Å¹æ²½µ¡Ç½¤ò»ý¤¿¤Ê¤¤¤¿¤á¡¢IPsec¤Ç°Å¹æ²½¤¹¤ë¡£²áµîÌä¡ÊH25SC½©¸á¸å¶Ìä2¡Ë¤Ç¤Ï¡¢¡ÖL2TP¤Ï¡¤¥¤¡¼¥µ¥Í¥Ã¥È¥Õ¥ì¡¼¥à¤¬ÊÑ´¹¤µ¤ì¤¿PPP¥Õ¥ì¡¼¥à¤ò¥«¥×¥»¥ë²½¤·¤ÆUDP¤ÇÁ÷¼õ¿®¤¹¤ë¥×¥í¥È¥³¥ë¤Ç¤¢¤ê¡¤¤³¤ì¤ÈIPsec¤òÁȤ߹ç¤ï¤»¤¿¤â¤Î¤¬L2TP over IPsec¤Ç¤¢¤ë¡£¡×¤È½Ò¤Ù¤é¤ì¤Æ¤¤¤ë¡£
L2TP¤ÏLayer2¤ÇIPsec¤ÏLayer3
°ìÊýPPTP¤Ï,
Ʊ¤¸¤³¤È¤ò¡¢¥Ö¥í¡¼¥É¥Ð¥ó¥É´Ä¶¤Ç¹Ô¤¤¤Þ¤¹¡£ÀܳÀè¤È¤·¤ÆIP¥¢¥É¥ì¥¹¤òÆþ¤ì¡¢ÀܳÀè¤Î¥ë¡¼¥¿¤ËÀܳ¤Ë¤¤¤¤Þ¤¹¡£ID¥Ñ¥¹¥ï¡¼¥É¤Çǧ¾Ú¡¢Àܳ¤·¤Þ¤¹¡£PPP¤Î³ÈÄ¥¤È¹Í¤¨¤ì¤Ð¤è¤¤¤Ç¤·¤ç¤¦¡£
¡¦RC4¤ò»È¤Ã¤¿°Å¹æ¤¬¤Ç¤¤ë¤è¤¦¤Ë¹©Éפµ¤ì¤Æ¤¤¤ë¤Ï¤º¡£Ê¸¸¥¤Ë¤è¤Ã¤Æ¤Ï¡¢PPTPñÂΤǤΰŹ沽µ¡Ç½¤Ï¤Ê¤¤¤È¤¤¤¦É½¸½¤â¤¢¤ê¡£
¡¦PPP¤ÈƱÍͤˡ¢¥À¥¤¥ä¥ë¥¢¥Ã¥×¤¬´ðËܤλȤ¤Êý¤Ç¤¢¤ë¤¬¡¢LAN´ÖÀܳ¤â²Äǽ¡£
¢ªPPTP¤ÈL2F¤ò¹ç¤ï¤»¡¢L2TP(Layer2 Tunneling Protocol)¤È¤·¤ÆÉ¸½à²½¡£
L2TP¤Ï°Å¹æ²½µ¡Ç½¤ò»ý¤¿¤Ê¤¤¤¿¤á¡¢IPsec¤Ç°Å¹æ²½¤¹¤ë¡£²áµîÌä¡ÊH25SC½©¸á¸å¶Ìä2¡Ë¤Ç¤Ï¡¢¡ÖL2TP¤Ï¡¤¥¤¡¼¥µ¥Í¥Ã¥È¥Õ¥ì¡¼¥à¤¬ÊÑ´¹¤µ¤ì¤¿PPP¥Õ¥ì¡¼¥à¤ò¥«¥×¥»¥ë²½¤·¤ÆUDP¤ÇÁ÷¼õ¿®¤¹¤ë¥×¥í¥È¥³¥ë¤Ç¤¢¤ê¡¤¤³¤ì¤ÈIPsec¤òÁȤ߹ç¤ï¤»¤¿¤â¤Î¤¬L2TP over IPsec¤Ç¤¢¤ë¡£¡×¤È½Ò¤Ù¤é¤ì¤Æ¤¤¤ë¡£
L2TP¤ÏLayer2¤ÇIPsec¤ÏLayer3